Download 'Crawl errors, Search queries' Data to Spreadsheet from Webmaster Tools; Google Protect 600M Users through Built-in Protection for Chrome, Firefox, and Safari

Now you can export your Google Webmaster Tools data directly to a Google Spreadsheet using the newly added download option. The new download option is available for most of the features, such as Crawl errors, Search queries, and Links to your site.If you enjoy digging into the data from Webmaster Tools but don't want to […]

Now you can export your Google Webmaster Tools data directly to a Google Spreadsheet using the newly added download option. The new download option is available for most of the features, such as Crawl errors, Search queries, and Links to your site.

If you enjoy digging into the data from Webmaster Tools but don't want to use Python scripts or the API, we've added new functionality just for you.

Now, you need no more using Python scripts or the API -- all you need to do is just click download button from a Webmaster Tools feature like Search queries, and you'll be presented with the "Select Download Format" option where you can choose to download the data as "CSV" or "Google Docs", posted Jonathan Simon, Webmaster Trends Analyst.

"Choosing "CSV" initiates a download of the data in CSV format which has long been available in Webmaster Tools and can be imported into other spreadsheet tools like Excel. If you select the new "Google Docs" option then your data will be saved into a Google Spreadsheet and the newly created spreadsheet will be opened in a new browser tab," Simon explains.

download to google spreadsheet from webmaster tools

In other blog post, Google today highlighted the achievements of its "Safe Browsing" efforts that aims to protect malware and phishing attacks.

"The goal of Safe Browsing is still the same today as it was five years ago: to protect people from malicious content on the Internet. Today, this protection extends not only to Google's search results and ads, but also to popular web browsers such as Chrome, Firefox and Safari," posted Niels Provos, Security Team.

"By protecting Internet users, webmasters, ISPs, and Google over the years, we've built up a steadily more sophisticated understanding of web-based malware and phishing," said Provos. Here is a quick refrence of the effort - as per Google blog post:

google safe browsing chart

  • "We protect 600 million users through built-in protection for Chrome, Firefox, and Safari, where we show several million warnings every day to Internet users.
  • We find about 9,500 new malicious websites every day. "While we flag many sites daily, we strive for high quality and have had only a handful of false positives."
  • Approximately 12-14 million Google Search queries per day show our warning to caution users from going to sites that are currently compromised. Once a site has been cleaned up, the warning is lifted.
  • We provide malware warnings for about 300 thousand downloads per day through download protection service for Chrome.
  • We send thousands of notifications daily to webmasters. Signing up with Webmaster Tools helps us communicate directly with webmasters when we find something on their site, and our ongoing partnership with StopBadware.org helps webmasters who can't sign up or need additional help.
  • We also send thousands of notifications daily to Internet Service Providers (ISPs) & CERTs to help them keep their networks clean. Network administrators can sign up to receive frequent alerts," Niels informs.

Phishing: "Even though we're still seeing some of the same techniques we first saw 5+ years ago, phishing attacks are also getting more creative and sophisticated:"

  • Faster - Many phishing webpages (URLs) remain online for less than an hour in an attempt to avoid detection.
  • More diverse - Targeted "spear phishing" attacks have become increasingly common. Additionally, phishing attacks are now targeting companies, banks, and merchants globally (Chart 2).
  • Used to distribute malware - Phishing sites commonly use the look and feel of popular sites and social networks to trick users into installing malware. For example, these rogue sites may ask to install a binary or browser extension to enable certain fake content.

Malware: Safe Browsing identifies two main categories of websites that may harm visitors:

  • Legitimate websites that are compromised in large numbers so they can deliver or redirect to malware.
  • Attack websites that are specifically built to distribute malware are used in increasing numbers.
"When a legitimate website is compromised, it's usually modified to include content from an attack site or to redirect to an attack site. These attack sites will often deliver "Drive by downloads" to visitors. A drive by download exploits a vulnerability in the browser to execute a malicious program on a user's computer without their knowledge," explains Niels.

Drive by downloads install and run a variety of malicious programs, such as:
  • Spyware to gather information like your banking credentials.
  • Malware that uses your computer to send spam.

Finally, in other Google news,

With Google I/O appraching, Google today introduced "Google Developers Live," a destination for developers around the world that will feature live, interactive broadcasts ranging from developer-focused game shows to Office Hours where you can connect with the engineers who created and work on your favorite Google product.

whether you're looking for Android, Chrome, Google+, Drive, Cloud Platform, Google Maps, YouTube or something else, tune in to Google Developers Live at http://developers.google.com/live.

Also, Google releases a new demo application that shows how to easily use the AdWords API Ruby client library with Rails. This simple web application demonstrates the following:

  • authorization against AdWords with OAuth 1.0a and credentials re-use
  • accounts hierarchy retrieval and account selection
  • simple service request (CampaignService.get) and display results
  • basic AdHoc reporting functionality with download support

Check out the README file on installation instructions and detailed walkthrough for the demo. Download the application from the library site or via git, or GitHub.